Configure AWS Pfsense instance to failover IPsec to another instance

i'm trying to have High Availability in AWS for my Pfsense instance, this instance has IPsec tunnels and also is the firewall of the instances behind the Pfsense. the rest of the instances are HA already with the AutoScaling service, but this approach does not work well with Pfsense. I launched a new pfsense in another AZ to function as the "slave". I configured it with the password and settings like that. In the "master" pfsense i configured the System -> High Avail Sync as the follow:
Master
Synchronize states: Enabled
Synchronize Interface: WAN
pfsync Synchronize Peer IP: Here i put the private IP of the WAN interface of the failover
Synchronize Config to IP: Here i put the private IP of the WAN interface of the failover
Remote System Username: admin (of the Failover)
Remote System Password: admin password (of the Failover)
Select options to sync: Everything selected

I know this topic is a bit old but I have not seen any solution so far. CARP will not work in AWS or Azure due to lack of multicast. Protocols like VRRP/GLBP are also not supported. However, I created a solution with scripting that I am hoping can help someone to setup some redundancy in AWS between two pfSense instances. I have been using this method for some time and it works very well. Here is a blog post that outlines how to achieve cluster/HA setup in AWS.http://www.hexblogger.com/index.php/2019/04/24/pfsense-cluster-in-aws/

News

Resources

Company

Our Mission

We provide leading-edge network security at a fair price - regardless of organizational size or network sophistication. We believe that an open-source security model offers disruptive pricing along with the agility required to quickly address emerging threats.